Keep Your E-Image Clean Digital Footprints Promoting Responsible and Ethical Online Behavior with Students Howie DiBlasi Emerging Technologies Evangelist Digital Journey howie@frontier.net www.drhowie.com Presentation : 2010 • • • • • • Guidelines of computer ethics Ethical online behavior Online resources for teaching ethics Internet safety Examples on digital footprints Better understand our online interactions • Tips for establishing a culture of proper use of technology in the classroom. • How teachers model ethical behavior online (Thanks to Arlene Salyards, Director of Technology & Data Northeast Colorado, > BOCES, 970-774-6152 http://www.neboces.com for the six links below) • • • • • • • • • • • • • • • My digital footprint http://dancallahan.net/2009/08/05/my-digital-footprint The most comprehensive people search on the web http://www.pipl.com/ Digital Footprints- Your New First Impression http://edupln.ning.com/video/digital-footprints-your-new Download the Digital Footprint Calculator http://www.emc.com/digital_universe/downloads/web/personal-ticker.htm Your Digital Footprint http://www.slideshare.net/shareski/your-digital-footprint Digital Footprints Flat Classroom Conference Building bridges today that society tomorrow will walk across http://flatclassroomconference.ning.com/forum/topics/digitalfootprints?page=1&commentId=2410443%3AComment%3A8234&x=1#2410443Commen t8234 Help Students Understand Their Web 2.0 Footprint http://www.educatorsroyaltreatment.com/2009/10/help-students-understand-their-web-20footprint.html What does that really mean? • Students should understand how to be safe and responsible online and how to create a digital footprint to be proud of today and tomorrow. Promoting Responsible and Ethical Online Behavior with Students …..where to start Tech Savvy Kids + Computers = BIG TROUBLE • http://drdwiki.wikispaces.com Poll Reveals Kids Think Hacking Is OK! Nearly half the elementary and middle school students who responded to a recent poll conducted by Scholastic, Inc., said they don't believe hacking is a crime. High School Student Arrested for Online Investment Fraud • A 14-year-old recently purchased inexpensive stocks, lied about their potential value in an investment chat room, and reaped hundreds of thousands of dollars when other investors bought his lies -- and the stocks! Police arrest Cybercrime forum teenagers • Scotland Yard... “largest international English speaking online cyber criminal forum”, has 8,000 members and offers online instructions on how to steal money. • • Pair arrested are 17 and 18 years old • • Suspected of encouraging or assisting crime, conspiracy to commit fraud, and breaking the Misuse of Computer Act. • • Police recovered over 65,000 credit card numbers that have been compromised • • Compromised cards could have led to the theft of £7.9 million, it was estimated. ( UK£ 7.9 million = $12.61235 million U.S. dollars ) • A 17-year-old high school student who lives at his parents' California home defrauded unwitting investors of more than $1 million in an online scam, according to the U.S. Securities Exchange Commission (SEC). • They claim he ran a business called Invest Better 2001 online and stockpiled some $900,000 of his gains in an account at a Costa Rica-based casino which he has agreed to turn over. Makaveli and Too Short (high school students) • Cloverdale, California • Federal official called it the most organized and systematic attack ever discovered. • Linking them to break-ins of at least eleven military computer systems • During the day, Makaveli and Too Short used their skills to build Cloverdale High's computer network. So why did they do it? • In an interview with an online publication, Makaveli said, • "It's power dude. You know power." Pentagon Seeks High School Hackers • Cyber Challenge - High school hackers- Uncle Sam wants you • Military program aimed at leveraging an untapped resource • National competitions for high school and college students • Foster a generation of Cyber security researchers. • Contests will test skills applicable to both government and private industry Cyber Challenge - High school hackers- Uncle Sam wants you Attacking and defending digital targets, stealing data, and tracing how others have stolen it. • Air Force will run a Cyber Patriot competition focused on network defense • SANS Institute- will organize the Network Attack Competition • Find and exploit vulnerabilities in software, compromise enemy systems and steal data. How do I participate in CyberPatriot, the High School Cyber Defense Competition? • http://www.nationalccdc.org/ • Student-Hacker Showdown at the Collegiate Cyber Defense Competition • http://www.informit.com/articles/article.asp x?p=462526 Shall we play a game….? • Memorable quotes from WarGames (1983) • Guidelines of computer ethics http://www.brainpop.com/technology/digitalcitizenship/ FBI Calls for Cyber Ethics Curriculum! At the conclusion of the recent cyber ethics conference, the FBI called on educators to institute programs to teach cyber ethics in schools. Guidelines of computer ethics • Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct • Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. State Law (Article 7.1 of Title 18.2 of the Code of Virginia) classifies damage to computer hardware or software (18.2152.4), unauthorized examination….etc • Guidelines for developing Cyber Ethics • • • • • • • • • • • • • Definition Guidelines Enforcement Procedure School AUP 2.0 Appropriate Use Policy Terms of Agreement Acceptable Uses Failure to Follow Acceptable Use Policy Internet Safety Use of New Web Tools Teacher Responsibilities Principal Responsibilities District Responsibilities Ten Commandments of Computer Ethics-(K-5 Used with permission: Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin • • • • • • • • • • 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10. Thou shalt use a computer in ways that show consideration of and respect for your fellow humans. • • • • • • • • • • • • • • • • • • The U-High/University Code of Ethics 1) I will not use the technology/communication system at U-High to harm, slander, injure or ridicule others. 2) I will not interfere with others’ use of the technology, including opening the files of others without their permission. 3) I will not use the computer to steal. 4) I will not use the computer to misrepresent my school or myself. 5) I will not copy software for which I have not paid. 6) I will not use equipment without authorization. 7) I will not copy text or ideas from the technology resources without permission from the author or referencing source. 8) I will be responsible for any consequences that arise from or that are a result of my computing activities. 9) I will use both the equipment and the programs in ways that show consideration, care, and respect. 10) I will be financially responsible and liable for any damages to either hardware or software resources that result from inappropriate or abusive behavior. 11) I will not allow another person to use my logon (ID) and password, nor will I use anyone else's ID and password. 12) I will abide by all rules and regulations of the system as changed or added from time to time by the administration of U-High and/or Illinois State University. 13) I will address all concerns regarding the use of technology first to the supervising teacher and/or school librarian and then to the U-High administration. 14) I will use the technology/computer system to further my education at University High School and will share my growing knowledge with others at U-High. 15) I recognize that email accounts are Illinois State University accounts and will be disciplined accordingly. 16) I recognize that all students deserve access as conditions permit. 17) I will not violate the terms and conditions of the Authorization for Internet Access as stated below. • Guidelines of computer ethics • Ethical online behavior • • • • • Online resources for teaching ethics Internet safety Examples on digital footprints Better understand our online interactions Tips for establishing a culture of proper use of technology in the classroom. • How teachers model ethical behavior online • I will not interfere with others’ use of the technology, including opening the files of others without their permission. • I will not copy software for which I have not paid. • I will not allow another person to use my logon (ID) and password, nor will I use anyone else's ID and password. I will not tamper with or change the computer settings • I will address all concerns regarding the use of technology first to the supervising teacher and/or school librarian and then to the U-High administration. Role play…Cyber Ethics.. • Group A • I will not interfere with others’ use of the technology, including opening the files of others without their permission. Role play…Cyber Ethics.. • Group B • I will not copy software for which I have not paid. • Role play…Cyber Ethics.. Group C • I will not allow another person to use my logon (ID) and password, nor will I use anyone else's ID and password. I will not tamper with or change the computer settings Ethical online behavior • LESSON SAMPLE: • Promoting Ethical Behavior Online — Our Values and Ethics • Level: Grades 7 - 9 Duration: One hour per activity • To open the lesson kit for printing, click here. • Cyber Safety Digital Citizenship Cyberbullying Learning Outcomes- Students will demonstrate: • an understanding of their Web-based activities as well as their perceptions of, and attitudes towards, these activities • an understanding of how to assess and measure their vulnerability to cyberbullying • an understanding of the importance of ethical behavior and "virtual reputation" in various Web environments • an understanding of the importance of protecting one's personal privacy online • an understanding that on the Internet, individuals are not always as anonymous as they believe themselves to be • Online resources for teaching ethics • What are the cyber ethics issues teachers must deal with? • The most common problem isn't hacking (illegally accessing Web sites) or cracking (vandalizing Web sites) • The unauthorized downloading of games and software. • The misuse of intellectual property, and copyright violations. ESTABLISHING A CULTURE OF PROPER USE • Establishing a culture of proper use • Detailed universal plan for technology use • • Discuss the issues • • Ethical rules they live by also apply to technology." Online resources for teaching ethics Reference material • Digital Citizenship WIKI • http://digicitizenship.wikispaces.com/ INCORPORATING CYBER ETHICS INTO YOUR CULTURE • Draw parallels between the real world and the electronic world. • Make direct comparisons between what students do on the Internet and how they behave in their daily lives. • Involve students in constructive activities. Ask them to develop ten rules for a classroom acceptable use policy, for example. • Post a written acceptable use policy in your classroom, and include the consequences for violating it. Web sites -ethical use of technology. • Surf Like a Hero, Not a Zero • Cybercitizen Partnership site provides information and a quiz about cyber ethics. • The Internet: Know Before You Go Into Cyberspace U.S. Department of Justice site offers activities to teach kids how to be good citizens of the Internet. Related Articles from Education World • Computer Rules Prevent Problems! • Danger Online! Educating Kids and Parents About Internet Safety • How Can Schools Make Better Use of the Internet? • Thank you to : Linda Starr - Education World® Copyright © 2000 Education World Internet safety • Rules of the Road for Kids • 1. Guard your privacy. What people know about you is up to you. • 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy today could cost you tomorrow. 3. Nothing is private online. Anything you say or do can be copied, pasted, and sent to gazillions of people without your permission. 4. Assume everyone is watching. There’s a huge, vast audience out there. If someone is your friend’s friend, they can see everything. 5. Apply the Golden Rule. If you don’t want it done to you, don’t do it to someone else. 6. Watch the clock. A virtual hug never matches a real one. Balance your life. 7. Choose wisely. Not all content is appropriate. You know what we mean. 8. Don't hide. Using anonymity to cloak your actions doesn’t turn you into a trustworthy, responsible human being. 9. Think about what you see. Just because it’s online doesn’t make it true. 10. Be smart, be safe. Not everyone is who they say they are. But you know that. • • • • • • • • Tech Tip: Checking Browser Histories • Browser keeps a list of destinations from most recent to oldest • A history can be cleared by anyone • Checking histories should be a regular part of managing your family's online lives • Can I friend you? • 43% of teens are exposed to cyberbullying in one form or another yet only 1 in 10 kids told their parents, according to a 2008 report from the U.S. National Crime Prevention Council 'Startling New Reality' of Cybercrime Revealed in RIT Research Findings A Rochester Institute of Technology study of more than 40,000 adolescents http://www.rit.edu/news/?r=46201 RIT study - High School Students • 21% admitted using a computer or electronic device to cheat on a school assignment • 12% admitted plagiarism • 65% have illegally downloaded music in the past year; • 34% have illegally downloaded movies RIT study - High School Students • 12% of students in high school circumvented computer security systems designed to filter or block their access to Web sites Internet Safety for High School Kids Tips • Can I friend you? • 22% of all teen girls -- 11% of teen girls ages 13-16 years old -- say they have electronically sent, or posted online, nude or semi-nude images of themselves, according to the National Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com RIT study - 7th & 8th Grade Students • 34% reported that they were able to use the Internet with no supervision • 42% of the children asked reported that they had spoken with at least one stranger online within the past year. RIT study - 7th & 8th Grade Students • Sharing personal information• • 39% of the children have posted photos of themselves • 36% have posted their real names • 14% have posted their schedules and personal contact information. If those dangers aren't real enough for you, maybe you would find it interesting to know that • 9% of the kids have accepted an online invitation to meet someone in-person • 10% have asked someone online to meet them in-person - agreeing to physically meet with people that they have never met before. Ethics of American Youth Survey by the Josephson Institute of Ethics • Survey findings-surveyed teens on conduct and behavior every two years since 1992. • It also found that in the past 12 months: • •52% of students have hit someone in anger. • •28% (37% of boys, 19% of girls) say it's OK to hit or threaten a person who angers them. • Ssurveyed 43,321 teens ages 15 to 18 • 78 public and 22 private schools • 50% said they had "bullied, teased or taunted someone at least once • 47% had been "bullied, teased or taunted in a way that seriously upset me at least once." Cyber bullying - middle school students • 15% of the kids have reported being embarrassed, bullied or threatened online • online • 4% admitted to harassing or threatening another person online RIT research on Cybercrimes • 14% reported that they had communicated with someone online about sexual things • 11% of students reported that they had been asked to talk about sexual things online; • 8% have been exposed to nude pictures • 7% were also asked for nude pictures of themselves online. http://www.cyberbullying.us/ • New Summary Fact Sheet - Cyberbullying: Identification, Prevention, and Response. • New Resources! Sexting: A Brief Guide for Educators and Parents, A Student's Guide to Personal Publishing (Offline and Online), Ten Ideas for Youth to Educate their Community about Cyberbullying, and A Summary of State Bullying and Cyberbullying Laws. • Five new research-based fact sheets: Cyberbullying and Self-Esteem, Cyberbullying and Suicide, Cyberbullying and Strain, Trends in Adolescents' Social Networking Use, and Changes in Social Networking Use from 2006 to 2009. http://anniefox.com/ • Why are kids mean to each other? • Usually they’re trying to get back at someone who hurt them. Or they’re trying to embarrass someone they don’t like even if that person hasn’t done anything. • Annie is a respected educator, awardwinning author, and a trusted online adviser. Her life’s work is helping teens become more self-aware, self-confident and better able to make choices that reflect who they really are. She does it through Q&A, events at schools, and books like her Middle School Confidential™ series. What can you do to be safer on line? Sooooo...What is the answer to all of these issues and problems? • http://oldfortyfives.com/DYRT.htm http://school.discoveryeducation.com/schrockguide/yp/iypsrch.html Web Of Trust • WOT is a Free Internet Security addon for Firefox and IE that warns you about online scams and risky websites that try to deliver malware or send spam. • http://www.mywot.com/ Search Engines Are No Longer Enough • If what ever you do online can be traced back to you and it stays forever what should you put online? There is No Delete Button on the Web There is No Delete Button on the Web • The Internet Archive and its Way Back Machine gives you a historical snapshot of a site within seconds. • http://www.readwriteweb.com/archives/soc ial_web_unforeseen_consequences.php The Wayback Machine http://www.archive.org/web/web.php Browse through over 150 billion web pages archived from 1996 to a few months ago. To start surfing the Wayback, type in the web address of a site or page where you would like to start, and press enter. Then select from the archived dates available. The resulting pages point to other archived pages at as close a date as possible. Keyword searching is not currently Tips for establishing a culture of proper use of technology in the classroom • http://www.educationworld.com/a_tech/tech/tech055.shtml How teachers model ethical behavior online • http://school-staff-issues.suite101.com/article.cfm/moraland-ethical-expectations-of-teachers-while-online • Teachers are expected to maintain a professional level of moral and ethical behavior and model these expectations to their students. Read more at Suite101: How Teachers Model Ethical Behavior Online • Teacher Tips for Maintaining Personal Social Networking Sites • • Importance of Ethics in a Corporate Environment • Creating Socially Responsible Students, Leaders • Read more at Suite101: Moral and Ethical Expectations of Teachers While Online • http://school-staff-issues.suite101.com/article.cfm/moral-and-ethical-expectations-of-teachers-whileonline#ixzz0vmji3cN3 Free Resources • Digital Citizenship Matrix: • http://knowwheretheygo.org/c3matrix/cyber_safety • • Industry Contact Directory to Report Abuse • http://www.scribd.com/doc/18404824/Cyber-Safety-andDigital-Literacy-Powerpoint-2009 • • Draft Digital Citizenship State Standards including Digital Literacy, safety, e-security and responsible and ethical behavior . Other resources: • www.ikeepsafe.org www.cybersmart.gov.au Keep Your E-Image Clean Digital Footprints Howie DiBlasi Emerging Technologies Evangelist Digital Journey howie@frontier.net www.drhowie.com Presentation : 2010 What is your digital footprint most like? By Tom Jackson What is my “Digital Footprint” • Examples on digital footprints Think before you post- Watch this video first.... • http://www.youtube.com/watch?v=SGlrAhtQC24&feature=player_embedded Think before you post • Watch this video first.... • http://www.youtube.com/watch?v=SGlrAht QC24&feature=player_embedded • Digital footprints are traces left by someone’s activity in a digital environment. Digital footprints are……. • traces left by someone’s activity in a digital environment. • two main classifications for digital footprints: passive and active. • passive digital footprint is created when data is collected about an action without any client activation • active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself • social media, “digital footprint” can refer to the size of one’s online presence as it relates to the number of individuals he or she is interacting with. • All of us, like it or not, are creating these trails. • There is all kinds of information ABOUT YOU to be found online. What do you know ???? • Do you know how long what you put on lines exists? • Do you know what the standard is for appropriate and inappropriate online behaviour? • Do you know what a digital footprint means? • Do you know how to take your steps to have a digital footprint that you will be proud of today and tomorrow too? • Will it be insignificant tomorrow, or in five years when you need to apply for college or seek new employment ?. Digital Dossier April 9, 2015 | slide 94 You’re Not as Private as You Think • http://www.commonsensemedia.org/you%E2%80%99re-not-private-you-think • 10 Ways You’re Not as Private as You Think 1. Allowing yourself to be publicly searchable on Facebook. • 2. Broadcasting your location. • 3. Ignoring your YouTube Activity Sharing settings. • 4. Using Chatroulette. • 5. Not talking to your kids about online privacy • 6. Giving your baby a Facebook page. Really? • 7. Neglecting to read a company's privacy policy. • 8. Using your real name as your user name in virtual worlds and other online games. • 9. Revealing your status. Instant messaging is the easiest way to give yourself up, • 10. Letting your kid sign up for anything before you know the facts.. • Footprints in the Digital Age (Will Richardson, Educause) • You need to be "clickable". Are you preparing your students to be Googled? (Will • The Less You Share, the Less Power You Have (Will Richardson, Blog post) • Who is Looking for You Online? • College Students in Trouble at School Tools to Track Your Footprints on the Web ! • 22 Places to find your “Digital Footprint” you never heard of… 22 Places to find your “Digital Footprint” • • • • • • • • • • • • • • • • • • • • • • • 1. BlogPulse: Trends in the Blogosphere 2. Pipl: Searching the Invisible Web 3. Spy: Watching what Happens on the Web 4. Serph: The Social Web Right Now 5. Social Mention: Mentions of your Name on the Social Web 6. Monitter: Tracking Twitter 7. BoardTracker 2.0: The Ultimate Search Tool for Forums 8. Google Alerts: The big G 9. Web footprints using Spokeo people search. 10. ZapTxt beats google or yahoo alerts, follows you to email or phone if you are offline on IM http://mashable.com/2008/06/19/zaptxt-version-two-im-sms/ 11. http://tweetgrid.com, allow you to track up to 9 keywords or hashtags at the same time, and tweet directly from their interface. 12. http://veryrecent.com Combines social media search, blog search and news search into one compact interface. 13. http://whostalkin.com- track your activities on Plurk/Twitter/blogs 14. BrowserSpy - your online presence. http://browserspy.dk/ 15. http://AskTwiTR.com searches Twitter in real time for Pic/Movie/Tags/Topic-display results on Google Map. 16. FairShare: track where your content goes once you publish it. http://beta.fairshare.cc https://fairshare.attributor.com/fairshare/ 17. People Search: Search by Name. http://www.peoplefinders.com 18. Conversation Monitter-ing and Spy-ing. :tools maltego (desktop client), backtype, retweetradar 19. Wink, Pipl, Spoke, Spock- Silobreaker -focused on news. 20. PowerTwitter -search right from the twitter interface, keywords or people. 21. Boardtracker - searching forums. Feedmysearch to turn your Google web searches into RSS feeds. 22. http://www.123people.com - people search, social networking search, news and blog search. 1. Pipl: Searching the Invisible Web • Pipl ($) claims to search the deep or invisible Web to find documents, blog entries, photos, publicly available information that other search engines don't serve up. • http://www.pipl.com/ 2. Best way to keep track of your web footprints • Spokeo people search. It will search across all major social networks and the Web to dig out your activities on them. • http://www.spokeo.com/ 3. Is this the best ? • 123people is a real time people search service that looks into nearly every corner of the Web. • Using our proprietary search algorithm, you can find comprehensive and name related information consisting of images, videos, phone numbers, email addresses, social networking and Wikipedia profiles plus much more. • Content is pulled from an extensive list of international and regional relevant sources in over 11 countries in multiple languages. • http://www.123people.com Spy: Watching what Happens on the Web • According to the site, Spy can "listen in on the social media conversations you're interested in." This clean visualization search tool watches Twitter, FriendFeed, blog posts, Google reader shares and Flickr • http://spy.appspot.com/ Why is your digital footprint important? Credit to Paul Vercher Why is your digital footprint important? Credit to Paul Vercher • Recruiters look for methods to differentiate between candidates –Who’s a viable candidate… –Who’s not a viable candidate • Recruiters need evidence to validate their decision –Your digital footprint provides this “evidence” Can you “google” me ? • What does it mean when a potential employer, college recruiter or client googles your name and does not find anything or much? • What if a principal searches for a potential hire’s name and work and does not find anything? • What does it mean NOT to have a digital footprint in these cases? • Is it positive or does it shed a negative light on your portfolio/resume? • What does it say about you, if you do not have a blog, a twitter account, nor other social network identities? • What does it mean if you, as a teacher do not have a Digital Teacher Portfolio? Digital Footprint – Google Profile Page 1 of Google The more social networking sites and bloging/twittering you do – the more your name will be “relevant” on a Google search or any search engine for that matter. However, if you have a common name (Tom Jackson) it does not matter how hard you work it – you will be back paged on Google. The good news is, there is a work around to have your name show up on page 1. The short cut is creating a “Google Profile”. This will put you on Page 1, despite how common your name is. Keep in mind that you must brand yourself. In other words link your name with your desired job title (Tom Jackson / Sales). When recruiters search various sites for Sales my name and sites will pull along with that key word. Creating a Google Profile: Google, in the search box type <ME>, hit return. This will take you to the Google profile page. Other useful web tricks: www.obviousexpert.com Digital Footprint – Google Profile (cont.) Page 1 of Google Adding your URL/Webpage to Google: This is a great way to short cut Google again. Do not wait for Google to find your sites – load your sites directly in to Google. -www.google.com/addurl/?continue=/addurl Make sure if you have multiple sites (ie LinkedIN, Facebook, Twitter, etc) that you link each site to the other. This what they call “nesting”. Nesting is very powerful because you are linking yourself to yourself multiple times. The search engines not only pick up on your url it also maps which urls are contained within your page. In other words you look bigger than you really are. Note: Site or URL does not mean that you have to have your own personal website (but do get one). When you created your linked in profile you were given a URL that points to your profile page (www.linkedin.com/in/thomasjacksonjr) that is a URL and the same applies to every social networking site on the internet. Digital Footprint – Google Resume Posting Google Resume How to upload your resume directly to Google: You can upload your resume directly to Google. All you need to do is use Google Docs. http://docs.google.com/?hl=en&tab=wo#owned-by-me Using either the URL above or just go to Google, from the More drop down select Documents. From the Google Docs menu select NEW Digital Footprint – Google Resume Posting (cont.) Google Resume How to upload your resume directly to Google: From the NEW menu you can upload your resume document to Google Docs. Digital Footprint – Google Resume Posting (cont.) Google Resume How to upload your resume directly to Google: Once your resume is pasted into Google Docs then it is time to SHARE it with the world – this is how it becomes searchable. NOTE: You can go back and edit this document anytime you want – AND – have multiple documents posted at the same time. Digital Footprint - Getting your name out there Digital Footprint Social Networking Sites- market yourself, let friends find you, recruiters find you, look for contacts and even look for jobs. -www.linkedin.com (#1 Social Network for Professionals and #1 for candidate searches by HR) -www.facebook.com (#2 for candidate searching by HR) -www.twitter.com (#3 for candidate searching by HR) -www.myspace.com Blogs:- useful ways to get people to find you, follow you (and listen to you) and want to network with you. - www.wordpress.com is a free blog site that I use – it has a LinkedIN add in and one for the iPhone - www.blogspot.com Quicklook comparison chart of popular blogging software: -www.ojr. org/ojr/images/ blog_software_ comparison. cfm Digital Footprint - Twitter Twitter:- #3 for HR/Recruiters when searching for job candidates. There are a lot of links that will help you manage twitter and find jobs on twitter – just takes a little digging. Twitter works best when working with 3rd party applications – many are web based. Homepage--www.twitter.com create your twitter account here Twitter Job Aggregator -http://www.tweetmyjobs.com/ is a webpage that allows you to create a profile and search for job-types by your geographical preference. Will send you a daily digest of jobs. -http://www.twithire.com/ webpage for jobs -www.Jobshouts.com -www.Tweetcruit.com - #jobangels - Twitter Resume Format - http://www.twtjobs.com/ ****Twitter resume template**** fill this out, save the url and you can re-tweet -http://www.twtbizcard.com/ ****Twitter business card template**** Twitter Managaer for the Desk Top - www.twitterdeck.com is a twitter utility to help keep tweets organized – desktop app Tweet Applications - http://twitter.pbworks.com/Apps Wiki page with listing of great apps to make twitter easier to navigate http://twitdom.com/ Page dedicated to Twitter Apps http://www.squidoo.com/twitterapps another page of twitter apps http://www.techcrunch.com/2009/02/19/the-top-20-twitter-applications/ more twitter apps http://www.twoquick.com/ Search engine (no funny # marks required) -http://www.twootles.com/ another search engine Digital Footprint – Twitter (cont.) Tweet Applications (cont.) -http://www.twellow.com search directory -http://wefollow.com/ list yourself on twitter -http://nearbytweets.com/ find twitters near you -http://tweetbeep.com/ twitter email alerts -http://www.twilert.com/ another twitter email alert site -http://www.twitterjobsearch.com/ twitter jobsite -http://www.twithire.com/ twitter jobsite -http://www.twitterjobsearch.com/ twitter jobsite -http://twitter.com/microjobs twitter jobsite -http://www.jobangels.org/ twitter jobsite -http://jobshouts.com/ twitter jobsite -http://www.tweetcruit.com/Default.aspx twitter jobsite -http://bit.ly/ shortens URL for posting in Tweets -http://tinyurl.com/ shortens URL for posting in Tweets 124 Establishing Your Digital Footprint • LinkedIn http://www.linkedin.com/ –Populate your profile with keywords • Enhance your chances of being “found” by recruiters –Write recommendations…include your name/job title/contact info • Demonstrates initiative, communication skills, passion 125 Establishing Your Digital Footprint • Twitter http://twitter.com/ –Secure your full name as a Twitter home page (e.g. PaulVercher) –Post information related to your field-ofinterest • Demonstrates initiative, communication skills, passion 126 Establishing Your Digital Footprint • Facebook http://www.facebook.com/ –Presentable portrait –Post resume –Keep “Friend” comments and responses upbeat and professional • Recruiters source Facebook to determine compatibility, communication skills, professionalism 127 Establishing Your Digital Footprint • Amazon.com http://www.amazon.com/ –Review books related to your job search • Demonstrates initiative, communications skills, passion 128 Establishing Your Digital Footprint • Blogging – Demonstrates initiative, communication skills, passion for subject matter – Positive (not phony), upbeat, value-add Blogger WordPress SQUARESPACE Phishing and Spyware April 9, 2015 | slide 129 Digital Identity From Wikipedia: Digital identity refers to the aspect of digital technology that is concerned with the mediation of people's experience of their own identity and the identity of other people and things. How do you manage and make informed choices about your digital identity? What does all of this mean in an educational context? What are the questions YOU need to ask of your learners to educate them about their digital identities? April 9, 2015 | slide 130 Identity Theft April 9, 2015 | slide 131 Digital Identity April 9, 2015 | slide 132 Digital Identity http://thisisme.reading.ac.uk April 9, 2015 | slide 133 Me and my (web) Shadow April 9, 2015 | slide 134 Digital Reputation http://www.agcas.org.uk April 9, 2015 | slide 135 Digital Reputation April 9, 2015 | slide 136 Digital Reputation April 9, 2015 | slide 137 Digital Footprint Calculator April 9, 2015 | slide 138 Garlik April 9, 2015 | slide 139 Keep Your E-Image Clean Digital Footprints Promoting Responsible and Ethical Online Behavior with Students Howie DiBlasi Emerging Technologies Evangelist Digital Journey howie@frontier.net www.drhowie.com Presentation : 2010 Done to this POINT • If what ever you do online can be traced back to you and it stays forever what should you put online? Digital Footprint - Getting your name out there Tips for Social Networking • http://www.commonsensemedia.org/tips-social-networking Social Networks: Facts of Life • Facebook and MySpace have privacy controls • Some sites require kids to be older than 13 to have a profile, but younger kids set up accounts anyway • There are no guarantees of privacy (even with settings) since anything can be cut, pasted, and sent • Inappropriate pictures, posts, or messages can result in damage to kids' reputations • Kids can "tag" (or identify) their friends which can violate their privacy Tips for Social Networking • http://www.commonsensemedia.org/tips-social-networking • • • • • • It's all about hanging with friends -- online. Why they matter Parent tips for young kids Parent tips for middle school kids Parent tips for high school kids Download resources in Spanish Understand our online interactions • Digital Footprints • Managing your digital footprint • By conducting periodic searches of your name, you'll always know what information is out there and have the opportunity to make corrections or adjustments as needed. Ensure there are plenty of positive associations • Build your own professional web page. Include your contact information, specialty, and resume, as well as some work samples. You also can feature articles of interest and links to your favorite websites. • Stack the deck in your favor. Websites such as ZoomInfo.com allow users to post information about themselves, so consider including details about your professional involvement and qualifications on these types of forums. • Share your insights. Posting your comments on industry forums or authoring online articles in your area of expertise is a smart way to reinforce your professional reputation. • Exercise discretion.